Hardening DNNs against Transfer Attacks during Network Compression using Greedy Adversarial Pruning.
Jonah O'Brien WeissTiago A. O. AlvesSandip KunduPublished in: AICAS (2022)
Keyphrases
- traffic analysis
- network anomaly detection
- network model
- multi agent
- security threats
- feature selection
- countermeasures
- communication networks
- greedy algorithm
- image compression
- peer to peer
- search space
- computer networks
- transfer learning
- watermarking scheme
- dynamic programming
- security risks
- ddos attacks
- normal traffic
- neural network
- network attacks
- network intrusion
- denial of service attacks
- network traffic
- network structure
- information security